Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows<\/title>\n<meta name=\"description\" content=\"Des chercheurs de Fortinet ont d\u00e9couvert une campagne de cyberespionnage men\u00e9e par un groupe connu sous le nom de Konni.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows\" \/>\n<meta property=\"og:description\" content=\"Des chercheurs de Fortinet ont d\u00e9couvert une campagne de cyberespionnage men\u00e9e par un groupe connu sous le nom de Konni.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html\" \/>\n<meta property=\"og:site_name\" content=\"PhonAndroid\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/phonandroid\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-25T07:00:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-25T06:20:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wp-pa.phonandroid.com\/uploads\/2023\/08\/Malware_sur_ordinateur_portable.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"William Zimmer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@iWilliiam\" \/>\n<meta name=\"twitter:site\" content=\"@phonandroid\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"William Zimmer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html\"},\"author\":{\"name\":\"William Zimmer\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/fef31779c56c756599cab3d0ddb24e31\"},\"headline\":\"Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows\",\"datePublished\":\"2023-11-25T07:00:38+00:00\",\"dateModified\":\"2023-11-25T06:20:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html\"},\"wordCount\":443,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"},\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html#respond\"]}],\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html\",\"url\":\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html\",\"name\":\"Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows\",\"isPartOf\":{\"@id\":\"https:\/\/www.phonandroid.com\/#website\"},\"datePublished\":\"2023-11-25T07:00:38+00:00\",\"dateModified\":\"2023-11-25T06:20:02+00:00\",\"description\":\"Des chercheurs de Fortinet ont d\u00e9couvert une campagne de cyberespionnage men\u00e9e par un groupe connu sous le nom de Konni.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.phonandroid.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.phonandroid.com\/#website\",\"url\":\"https:\/\/www.phonandroid.com\/\",\"name\":\"PhonAndroid\",\"description\":\"PhonAndroid\",\"publisher\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.phonandroid.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.phonandroid.com\/#organization\",\"name\":\"PhonAndroid\",\"url\":\"https:\/\/www.phonandroid.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.phonandroid.com\/wp-content\/themes\/phonadroid-v3\/assets\/images\/lg-phonandroid-amp-4.png\",\"contentUrl\":\"https:\/\/img.phonandroid.com\/2023\/06\/dark.png\",\"width\":280,\"height\":60,\"caption\":\"PhonAndroid\"},\"image\":{\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/phonandroid\",\"https:\/\/twitter.com\/phonandroid\",\"https:\/\/www.youtube.com\/user\/Phonandroidtv\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/fef31779c56c756599cab3d0ddb24e31\",\"name\":\"William Zimmer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43e75406ee28c2e75bbb7008841168f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43e75406ee28c2e75bbb7008841168f7?s=96&d=mm&r=g\",\"caption\":\"William Zimmer\"},\"description\":\"Baign\u00e9 dans les nouvelles technologies depuis mon plus jeune \u00e2ge, j\u2019adore me tenir au courant de l\u2019actualit\u00e9. Joueur dans l\u2019\u00e2me, je suis un fervent d\u00e9fenseur du Cloud Gaming. Sinon, j\u2019adore voyager aux quatre coins du monde et binge-watcher des s\u00e9ries.\",\"sameAs\":[\"https:\/\/twitter.com\/iWilliiam\"],\"url\":\"https:\/\/www.phonandroid.com\/author\/williamzimmer\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows","description":"Des chercheurs de Fortinet ont d\u00e9couvert une campagne de cyberespionnage men\u00e9e par un groupe connu sous le nom de Konni.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html","og_locale":"fr_FR","og_type":"article","og_title":"Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows","og_description":"Des chercheurs de Fortinet ont d\u00e9couvert une campagne de cyberespionnage men\u00e9e par un groupe connu sous le nom de Konni.","og_url":"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html","og_site_name":"PhonAndroid","article_publisher":"https:\/\/www.facebook.com\/phonandroid","article_published_time":"2023-11-25T07:00:38+00:00","article_modified_time":"2023-11-25T06:20:02+00:00","og_image":[{"width":1200,"height":750,"url":"https:\/\/wp-pa.phonandroid.com\/uploads\/2023\/08\/Malware_sur_ordinateur_portable.jpg","type":"image\/jpeg"}],"author":"William Zimmer","twitter_card":"summary_large_image","twitter_creator":"@iWilliiam","twitter_site":"@phonandroid","twitter_misc":{"Written by":"William Zimmer","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html#article","isPartOf":{"@id":"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html"},"author":{"name":"William Zimmer","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/fef31779c56c756599cab3d0ddb24e31"},"headline":"Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows","datePublished":"2023-11-25T07:00:38+00:00","dateModified":"2023-11-25T06:20:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html"},"wordCount":443,"commentCount":1,"publisher":{"@id":"https:\/\/www.phonandroid.com\/#organization"},"articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html#respond"]}],"copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/www.phonandroid.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html","url":"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html","name":"Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows","isPartOf":{"@id":"https:\/\/www.phonandroid.com\/#website"},"datePublished":"2023-11-25T07:00:38+00:00","dateModified":"2023-11-25T06:20:02+00:00","description":"Des chercheurs de Fortinet ont d\u00e9couvert une campagne de cyberespionnage men\u00e9e par un groupe connu sous le nom de Konni.","breadcrumb":{"@id":"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.phonandroid.com\/microsoft-word-est-utilise-par-des-pirates-nord-coreens-pour-attaquer-les-utilisateurs-de-windows.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.phonandroid.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft Word est utilis\u00e9 par des pirates nord-cor\u00e9ens pour attaquer les utilisateurs de Windows"}]},{"@type":"WebSite","@id":"https:\/\/www.phonandroid.com\/#website","url":"https:\/\/www.phonandroid.com\/","name":"PhonAndroid","description":"PhonAndroid","publisher":{"@id":"https:\/\/www.phonandroid.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.phonandroid.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.phonandroid.com\/#organization","name":"PhonAndroid","url":"https:\/\/www.phonandroid.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.phonandroid.com\/wp-content\/themes\/phonadroid-v3\/assets\/images\/lg-phonandroid-amp-4.png","contentUrl":"https:\/\/img.phonandroid.com\/2023\/06\/dark.png","width":280,"height":60,"caption":"PhonAndroid"},"image":{"@id":"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/phonandroid","https:\/\/twitter.com\/phonandroid","https:\/\/www.youtube.com\/user\/Phonandroidtv"]},{"@type":"Person","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/fef31779c56c756599cab3d0ddb24e31","name":"William Zimmer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43e75406ee28c2e75bbb7008841168f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43e75406ee28c2e75bbb7008841168f7?s=96&d=mm&r=g","caption":"William Zimmer"},"description":"Baign\u00e9 dans les nouvelles technologies depuis mon plus jeune \u00e2ge, j\u2019adore me tenir au courant de l\u2019actualit\u00e9. Joueur dans l\u2019\u00e2me, je suis un fervent d\u00e9fenseur du Cloud Gaming. Sinon, j\u2019adore voyager aux quatre coins du monde et binge-watcher des s\u00e9ries.","sameAs":["https:\/\/twitter.com\/iWilliiam"],"url":"https:\/\/www.phonandroid.com\/author\/williamzimmer"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2561008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/users\/121"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/comments?post=2561008"}],"version-history":[{"count":17,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2561008\/revisions"}],"predecessor-version":[{"id":2561010,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2561008\/revisions\/2561010"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/media\/2540068"}],"wp:attachment":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/media?parent=2561008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/categories?post=2561008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/tags?post=2561008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}

Cr\u00e9dits : 123RF<\/figcaption><\/figure>\n

Cara Lin, chercheur chez Fortinet, a identifi\u00e9 une tentative de livrer \u00e0 ses victimes un document Microsoft Word malveillant en langue russe. Le responsable serait un groupe situ\u00e9 en Cor\u00e9e du Nord, connu sous le nom de Konni, le document, cens\u00e9 pr\u00e9senter les \u00e9valuations occidentales d'une op\u00e9ration militaire sp\u00e9ciale, sert de d\u00e9guisement aux activit\u00e9s malveillantes qu'il contient.<\/strong><\/p>\n

L'attaque fait appel \u00e0 un logiciel malveillant \u00e0 base de macros qui, une fois activ\u00e9, ex\u00e9cute un script Batch int\u00e9rimaire. Ce script ex\u00e9cute des fonctions essentielles, notamment des v\u00e9rifications du syst\u00e8me, le contournement des param\u00e8tres du contr\u00f4le de compte d'utilisateur (<\/strong>UAC) et, enfin, le d\u00e9ploiement d'une DLL (biblioth\u00e8que de liens dynamiques) de vol d'informations.<\/strong><\/p>\n

Lire \u00e9galement – Les pirates nord-cor\u00e9ens ont vol\u00e9 1,54 milliard d\u2019euros en cryptomonnaies en 2022<\/a><\/p>\n